Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
http://www.ubuntu.com/usn/USN-2995-1
http://www.securitytracker.com/id/1035647
http://www.securityfocus.com/bid/91787
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
https://security.gentoo.org/glsa/201607-01
https://access.redhat.com/errata/RHSA-2016:1140
https://access.redhat.com/errata/RHSA-2016:1139
https://access.redhat.com/errata/RHSA-2016:1138
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
http://www.securityfocus.com/bid/86788
http://www.debian.org/security/2016/dsa-3625
http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html